In these times of complex, advanced and persistent attacks threatening all Internet connected organizations, detecting malware and the associated activities of malware is increasingly important. Defending enterprises against
these kinds of adversaries is not easy.
This white paper explores:
It's an unprecedented time of cyber-attacks, and information about attacker methods is difficult to obtain, unless you are the victim. And let's face it - by then, it's too late.
This white paper details:
Lessons learned about cyber-attacks from extensive interviews with security analysts;
The common thread that...
Modern enterprises are consistently being targeted by their adversaries, whose objectives range from financial gain to achieving strategic superiority through the theft of data or key intellectual property, outright destruction and interruption of business processes, or simply establishing a beachhead to be exploited...
The FDA has issued draft guidance urging medical device makers to develop cybersecurity controls. It has also released tips for how healthcare organizations can mitigate cybersecurity risks to devices.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
A recent spear-phishing attack involving a Trojan designed to target Android devices offers an important reminder of the emerging threat of mobile malware, says Kaspersky Lab researcher Kurt Baumgartner.
Today's spear-phishing campaigns are localized, small and can slip through typical spam filters. As a result, detection practices have to evolve, says researcher Gary Warner of the University of Alabama at Birmingham.
Financial institutions and businesses involving Internet banking, online brokerage, alternative payment solutions or e-commerce websites in particular face a growing number of targeted attacks. These online banks and their customers are the targets of focused hacking attempts from fraudsters who are constantly trying...
You've found a virus running on your server. You discover login IDs on your network that don't belong. A hacker has your credit card database. Any one of these is enough for you to hit your panic button and lose it. Don't.
In this eBook, learn:
Tips on how to handle various emergency scenarios;
Hackers were using a Facebook page as a how-to site for financial crime and to sell banking Trojans. One RSA security expert says this public promotion signifies the mainstreaming of "fraud-as-a-service."
New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
This white paper discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and...